From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme., , , , и . Future Gener. Comput. Syst., (2014)Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy., , и . J. Inf. Secur. Appl., (2019)Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing., , и . KSII Trans. Internet Inf. Syst., 13 (2): 1043-1063 (2019)Identity-based public auditing for cloud storage systems against malicious auditors via blockchain., , , и . Sci. China Inf. Sci., 62 (3): 32104:1-32104:16 (2019)Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy., , и . FCS, том 879 из Communications in Computer and Information Science, стр. 121-137. Springer, (2018)A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography., , , и . J. Medical Systems, 39 (3): 24 (2015)Identity-based provable data possession revisited: Security analysis and generic construction., , , , , , и . Comput. Stand. Interfaces, (2017)Cloud data auditing with designated verifier., , и . Frontiers Comput. Sci., 8 (3): 503-512 (2014)Secure and efficient privacy-preserving public auditing scheme for cloud storage., , , и . Comput. Electr. Eng., 40 (5): 1703-1713 (2014)Cryptanalysis of an integrity checking scheme for cloud data sharing., , , , и . J. Inf. Secur. Appl., (2015)